Vulnerability Details : CVE-2023-2585
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
Vulnerability category: Bypass
Products affected by CVE-2023-2585
- cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
- cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-2585
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-2585
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST | 2024-01-02 |
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N |
0.9
|
2.5
|
Red Hat, Inc. |
CWE ids for CVE-2023-2585
-
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2023-2585
-
https://access.redhat.com/errata/RHSA-2023:3892
RHSA-2023:3892 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://access.redhat.com/security/cve/CVE-2023-2585
CVE-2023-2585- Red Hat Customer PortalVendor Advisory
-
https://access.redhat.com/errata/RHSA-2023:3884
RHSA-2023:3884 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://access.redhat.com/errata/RHSA-2023:3885
RHSA-2023:3885 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2196335
2196335 – (CVE-2023-2585) CVE-2023-2585 keycloak: client access via device auth request spoofIssue Tracking;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2023:3883
RHSA-2023:3883 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://access.redhat.com/errata/RHSA-2023:3888
RHSA-2023:3888 - Security Advisory - Red Hat Customer PortalVendor Advisory
Jump to